<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Applocker — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/applocker/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:23:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/applocker/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detect PowerShell AppLocker Policy Import Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-applocker-policy-import/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-applocker-policy-import/</guid><description>Detection of PowerShell commands to import AppLocker policy via Import-Module Applocker and Set-AppLockerPolicy, potentially used to enforce restrictive policies or disable security products like antivirus.</description><content:encoded><![CDATA[<p>This threat brief outlines the detection of malicious PowerShell activity involving the import of AppLocker policies. Attackers may use AppLocker to enforce restrictive policies on compromised systems, which can lead to the disabling of security products like antivirus software, as observed with the Azorult malware. The activity is detected through PowerShell Script Block Logging, specifically EventCode 4104, which captures and analyzes script block text for the use of &ldquo;Import-Module Applocker&rdquo; and &ldquo;Set-AppLockerPolicy&rdquo; commands with an XML policy file. Detecting this activity early is crucial to prevent attackers from establishing persistence and further compromising the system by bypassing security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script to import the AppLocker module using <code>Import-Module Applocker</code>.</li>
<li>The script then uses <code>Set-AppLockerPolicy</code> to apply a new AppLocker policy.</li>
<li>The <code>-XMLPolicy</code> parameter is used to specify an XML file containing the malicious AppLocker rules.</li>
<li>The new AppLocker policy restricts the execution of legitimate applications, including antivirus software.</li>
<li>The attacker establishes persistence by ensuring the malicious AppLocker policy is applied at system startup.</li>
<li>With security controls disabled, the attacker deploys and executes additional malware or performs lateral movement.</li>
<li>The final objective is data exfiltration or further system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the complete bypass of endpoint security controls, leaving systems vulnerable to malware infections and data breaches. This can result in significant financial losses, reputational damage, and legal liabilities. If security software is disabled on a large number of endpoints, the impact is organization-wide.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging (EventCode 4104) on all endpoints to capture the necessary data for detection.</li>
<li>Deploy the Sigma rule <code>Detect AppLocker Policy Import via PowerShell</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the <code>ScriptBlockText</code> and the source of the PowerShell execution.</li>
<li>Implement strict AppLocker policies to prevent unauthorized applications from running.</li>
<li>Monitor endpoints for unexpected changes to AppLocker policies.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>applocker</category><category>powershell</category><category>defense-evasion</category><category>endpoint</category></item><item><title>Suspicious AppLocker XML Policy Import via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-applocker-xml-import/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-applocker-xml-import/</guid><description>Detection of PowerShell commands used to import AppLocker XML policies, potentially indicating an attempt to bypass security controls, as observed with Azorult malware.</description><content:encoded><![CDATA[<p>This brief focuses on detecting the suspicious use of PowerShell to import AppLocker XML policies. Attackers may leverage this technique to impair defenses by modifying AppLocker policies to allow malicious executables or scripts to run, bypassing existing security measures. The observed behavior involves the use of &ldquo;Import-Module Applocker&rdquo; and &ldquo;Set-AppLockerPolicy&rdquo; commands combined with the &ldquo;-XMLPolicy&rdquo; parameter. This activity has been linked to malware such as Azorult, where adversaries attempt to weaken endpoint security to facilitate further compromise. Defenders should prioritize monitoring for this behavior, as successful manipulation of AppLocker policies can lead to significant security breaches and persistent access for malicious actors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (details of initial access are not provided in the source).</li>
<li>The attacker executes PowerShell.exe.</li>
<li>The attacker imports the AppLocker module using <code>Import-Module Applocker</code>.</li>
<li>The attacker uses the <code>Set-AppLockerPolicy</code> cmdlet with the <code>-XMLPolicy</code> parameter to specify a path to a malicious AppLocker XML policy file.</li>
<li>The malicious AppLocker policy is applied, potentially whitelisting attacker-controlled files or paths.</li>
<li>The attacker executes previously blocked malicious code, leveraging the modified AppLocker policy.</li>
<li>The attacker achieves persistence and further compromises the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack allows adversaries to impair endpoint defenses by modifying AppLocker policies. This can lead to the execution of malware that would otherwise be blocked. The observed behavior has been linked to the Azorult malware family. The compromise of endpoint security can allow for persistence, data exfiltration, and further lateral movement within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect AppLocker Policy Import via PowerShell</code> to your SIEM to detect suspicious AppLocker policy modifications.</li>
<li>Enable Sysmon Event ID 1 and Windows Event Log Security 4688 to provide the necessary process creation and command-line auditing for the Sigma rule.</li>
<li>Investigate any instances where <code>Import-Module Applocker</code> and <code>Set-AppLockerPolicy</code> are used together, especially when the <code>-XMLPolicy</code> parameter is present.</li>
<li>Review existing AppLocker policies for unexpected or unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>applocker</category><category>defense-evasion</category><category>powershell</category></item><item><title>AppLocker Registry Modification to Deny Security Software Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-applocker-security-software-deny/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-applocker-security-software-deny/</guid><description>Attackers can modify the Windows registry via AppLocker to block the execution of security software, potentially disabling defenses and allowing further malicious activities.</description><content:encoded><![CDATA[<p>Attackers can leverage AppLocker to modify the Windows registry to deny the execution of security products, effectively impairing defenses. This technique involves manipulating registry keys and values associated with AppLocker policies to block specific antivirus and security software. This activity is often associated with malware such as Azorult, which attempts to disable or bypass security measures. By successfully blocking security software, attackers can facilitate further malicious activities, such as malware installation, data exfiltration, and persistence within the compromised environment. Defenders should monitor for unusual AppLocker registry modifications that target known security product vendors to identify potential attempts to disable defenses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system through methods such as phishing or exploiting a vulnerability.</li>
<li>Attacker elevates privileges to gain administrative access, required to modify AppLocker policies.</li>
<li>Attacker modifies the registry keys associated with AppLocker policies, specifically targeting the Software Restriction Policies (SRP) to deny execution of security software.</li>
<li>The attacker modifies the <code>registry_value_data</code> within <code>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\SrpV2\</code> to include Action=&ldquo;Deny&rdquo; for targeted security vendors like Symantec, McAfee, or Kaspersky.</li>
<li>AppLocker policies are updated based on the modified registry settings.</li>
<li>The targeted security software is prevented from executing, effectively disabling or impairing its functionality.</li>
<li>Attacker proceeds to install malware, exfiltrate data, or establish persistence without interference from the disabled security software.</li>
<li>The attacker achieves their final objective, such as data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a significant degradation of the security posture of the affected system. By disabling or impairing security software, attackers can bypass critical defenses and gain unfettered access to sensitive data and systems. This can lead to data breaches, financial losses, reputational damage, and disruption of business operations. The Azorult malware has been observed using this technique to disable security products.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 13 to monitor registry modifications and activate the provided Sigma rules (process_creation and registry_set).</li>
<li>Deploy the provided Sigma rules to detect AppLocker registry modifications targeting security software vendors and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rules to identify potentially malicious activity, correlating with other endpoint telemetry.</li>
<li>Review and audit AppLocker policies to ensure they are configured correctly and not being used to block legitimate security software.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>applocker</category><category>defense-evasion</category><category>registry-modification</category></item></channel></rss>